Ss 3 E-Note Second Term Computer
Ss 3 E-Note Second Term Computer
Ss 3 E-Note Second Term Computer
2023
7
WAEC ACCESS 2019 3 WAEC ACCESS 2019
8
WORD AND POWERPOINT WORD AND POWERPOINT PRACTICAL
10 REVISION
11 Revision
12 Examination
13
3(a) Table 1 shows the actions perfomed by a company on its stored files.
Tick the actions that will ensure that the files are kept confidential and secured
S/N ACTIONS TICK
1 use of anti virus
2 use of backup
3 use of biometrics
4 use of folder
5 use of manual file
6 use of password
(b) list two disadvantages of computer files as compared to manual files.
(c)(i) define charts as its relates to Ms Excel
(ii) give two types of charts in Ms Excel
Write a simple QBASIC instruction that will accept a word from the keyboard and check if it is a
palindrome or not. The palindrome must display a message showing if the word is palindrome or
not.
Name of
Description of Storage Device Storage Category of Storage Device
Device
5. Write a QBASIC program to grade any score entered from the keyboard as either "Poor" for a
score that is below 50% or "Satisfactory" for a score that is equal to or above 50%. The program
execution should stop as soon as a score that is less than zero is entered.
1a. Match each type of ICT in Table 1 with its relevant communication sector
ICT TYPE |Communication Sector
Statellite |communication Radio
Broadcasting |Internet
Data netwrok |GSM
Tele communicaiton |Video Conferencing
1b. List three computing devices that belong to each of
(i) 19th; and
(ii) 20th century periods
2a. List (i) three application areas of a word processing program; (ii) three types of data item
2b. Identify the four data types available in Table 2.
Question 1:
(a) Define a computer virus and explain how it spreads from one computer to another.
(b) Describe two preventive measures individuals can take to protect their computers from virus
infections.
Answer 1:
(a) A computer virus is a malicious software program designed to replicate itself and spread to other
computers by attaching to legitimate programs or files. It can be spread through infected email
attachments, compromised websites, or infected software installations.
(b) Two preventive measures are keeping antivirus software up to date and avoiding downloading
files or clicking on links from unknown or suspicious sources.
Question 2:
Explain the key differences between a computer virus and a computer worm. Provide examples of
each and discuss the potential impacts they can have on a computer system.
Answer 2:
A computer virus requires a host program to spread, whereas a computer worm is a standalone
program capable of replicating itself across a network. An example of a virus is the "Melissa" virus,
which spread through infected Word documents, while an example of a worm is the "Conficker"
worm, which exploited network vulnerabilities. Both viruses and worms can cause data loss, system
crashes, and unauthorized access to sensitive information.
Question 1:
(a) Define solid-state drive (SSD) and explain its advantages over traditional hard disk drives (HDD).
(b) Describe a scenario where an external hard drive would be a useful storage solution, providing
specific advantages in that context.
Answer 1:
(a) A solid-state drive (SSD) is a storage device that uses NAND-based flash memory to store data.
It is faster, more durable, and consumes less power compared to traditional hard disk drives (HDD).
SSDs have no moving parts, leading to improved data access and reduced risk of mechanical failure.
(b) An external hard drive would be useful when needing to back up large amounts of data, such as
media files or important documents. Its advantages include portability, plug-and-play functionality,
and the ability to expand storage without opening the computer.
www.deeperlifehighschool.org …leadership with distinction
WAEC 2020 Computer Studies
2(a) (i) What is video conferencing? (ii) Mention four essential items to a video conference.
(III) Give two examples of other hardware components essential to video conference
(b) Give two examples of data cables.3
(b)(i) What are input devices? (ii) List four input devices5
5(a) Explain two differences between an Algorithm and a Flowchart.
(b) List three examples of utility programs.
(c) Draw a flowchart of the stops to be used in updating a customer's balance.
1(a) i() What is firewall? (ii) List two methods used in protecting the computer system.
(b) Explain the following stages of the System Development Life Cycle: (i) feasibility study; (ii)
design; (iii) maintenance.
2(a) A musician intends to record music on a storage medium. List four ways that the music file
can organized in the storage medium.
(b) State two basic operations on computer file. (c) Explain the following computer terms: (i) file
(ii) re cord3
3(a) Explain the following terms: (i) storage device; (ii) virtual memory.
(b) Two storage devices have capacities 2KB and 2MB respectively. (i) Calculate the number of
bits that each of 2KB and 2MB can hold. 2 KB: 2 MB
(i) Putting the two storage together, calculate the total capacity in bytes.4
4(a) (i) identify Figure 1. (ii) Name the parts labeled I, J, K and L in Figure 1
(b)(i) Define the documentation stage in Program Development Life Cycle. (ii) List three
characteristics of a good computer program.
5(a)(i) Define the term encryption. (ii) Tick two authentication techniques involved in security
measure from Table 1.
Table 1
(ii) Outline two features of data encryption. (b) While exchanging data with a friend through your
mobile phone, you observed that it took a longer time than usual. Outline four factors that may be
responsible for the delay in the data transfer.
TECHNIQUE TICK()
Firewall
Biometric
Password
Intranet
WEEK 4
WEEK 5
www.deeperlifehighschool.org …leadership with distinction
Excel practical WAEC 2022
Daniel James and three of his friends came up with the idea of starting a travel agency for college
students in Nigeria. They invested sixty thousand naira each and started their dream company,
SUMMER BREAK
TRAVELS INC.
As sales continued to grow, the management of Summer Break Travels Inc. realised they need a
better tracking system for First Quarter
Sales.
Prepare a First Quarter Sales Worksheet that shows the sales for the first quarter using the details in
the table below
Markerting outlets[#]
location[vacation place] mail campus telephone internet
bar beach 5,297.23 3,871.35 4,720.45 2,998.65
trans amusement park ibadan 2,823.23 4,840.53 2,703.56 4,911.16
agodi gardens 6,256.25 7,256.12 2,436.86 7,709.32
obudu park calabar 2,856.15 437.20 4,997.60 1,201.45
total
(b) Format the table using the instruction below: ) the title "Summer Break Travels, Inc.
First Quarter Sales" should be Bold and in Upper Case;
(ii) fill the table with white background 1 darker-25"
[c] Create two charts for the first quarter sales: )
[i] a pie chart stating the most effective sales method;
[ii] a bar chart stating the most popular vacation place.
[d] Type in the formula used in calculating total for each location below your table
(enclosed in"")
[e] Save, print out your work and submit to the supervisor.
As the account clerk of an organisation, you are to prepare the table as shown below using a
spreadsheet application:
Worker Wage/day(#)
Edeh 1500
Usman 1750
www.deeperlifehighschool.org …leadership with distinction
Steven 1200
Ololade 650
Comfort 897
Joe 2371
(a) Copy and paste table title "Workers' Wages" on the same sheet. Format this new table as
follows:
(i) Title the new table as SALARIES
(ii) Sort the table in alphabetical order
(iii) Calculate average wage of workers per day
(iv) Calculate the max and min wages paid to the workers from the SALARIES
INSTRUCTIONS: (a) Sort the table on SURNAME and FIRST NAME in ascending order.
(b) Delete the record for employee 279.
(c) Create a report from the table and name it SALARY. The header of the report should read
"EMPLOYEE SALARY".
(d) Format:
(i) the column headings of the report with font size 14pt and bold;
(ii) The other inputs with, font size 12pt.
(e) Apply border line.
(f) Insert your full name and index number.
(g) Print and submit to the supervisor
INSTRUCTIONS: (a) Sort the table on SURNAME and FIRST NAME in ascending order.
(b) Delete the record for employee 279.
(c) Create a report from the table and name it SALARY. The header of the report should read
"EMPLOYEE SALARY".
(d) Format:
(i) the column headings of the report with font size 14pt and bold;
(ii) the other inputs with, font size 12pt.
(e) Apply border line.
(f) Insert your full name and index number.
(g) Print and submit to the supervisor
COMPUTER
USES
DEVICES
Electronic general-purpose computer programmed
EDVAC
to perform complex sequences of operation.
Electronic digital stored-program computer
ENIAC intended for the bureau of census and later for
presidential election.
Electronic computer, binary in nature with
UNIVAC automatic addition, subtraction multiplication and
programmed division.
4
4(a) In a tabular form, state two differences between random access memory and read only memory
(b) State four characteristics of windows operating system environment.
(c) list two examples of utility programs5
Using a word processing package, create a college time table format titled "COLLEGE TIME
TABLE" for 7 subjects (English, Maths, Biology, Chemistry, Physics, Civic Education and
Computer Studies), for 5 days with minimum of 45minutes duration. Lunchtime is 40minutes,
lesson in the college have a minimum of 5 periods/week.
(a) Format the "COLLEGE TIME TABLE" using the following:
(i) The title of the table should be aligned centre, bold and underline;
(ii) Use table design style of any type
(iii) Days of the week should be bold
(b) Save your work with your full name in the folder created.
(c) print and submit your work
use microsoft power point application to create the presentation on the topic computer systems
[a] use title slide and type computer systems with font type arial black and size 44 points
[b] use title and content layout slide and type the following passage with font type:
A computer is a device that accepts information in the form of digitized data and manipulates it for
some results based on a program or sequence of instructions on how the data is to be processed
[c] Insert next slide and type the following using the same font type and size as in (b)
CLASSIFICATION OF COMPUTERS
[d] insert next slide and type the following using the same font type and size in 1b
CLASSIFICATION BY TYPE
Digital Computer, Analogue Computer, Hybrid Computer. (Note: use bullet list for the items)
(e) Insert next slide and type the following using the same font type and size as in 1 (b).Mini
Computer, Mainframe Computer, (Note: use a different list type for the Micro Computer, Super
Computer items)
CLASSIFICATION BY GENERATION
First Generation eg UNIVAC
Second Generation eg HAVARD MARKII
Third Generation eg IBM 360
Fourth Generation eg Microcomputer (Note: use a different list type for the items)